Information technology law
The DPO lawyer
The lawyer can perform the function of Data Protection Officer.
According to Article 37 of the Regulation, the appointment of a DPO is mandatory when
a) the processing is carried out by a public authority or a public body, with the exception of courts acting in the exercise of their judicial function;
b) the core activities of the controller or the processor consist of processing operations which, by virtue of their nature, scope and / or purposes, require regular and systematic monitoring of individuals concerned; or
c) the core activities of the controller or processor consist of large-scale processing of special categories of criminal or sensitive data.
In addition, it is always possible to appoint a Data Protection Officer for prophylaxis.
The added value of a Data Protection Lawyer
The complexity and rapid evolution of the field of data protection and information technology law, require that "compliance" is always "up to date".
In addition, a lawyer’s code of ethics guarantees secrecy and prohibits any conflict of interest.
Information technology law
In theory, Internet law does not exist. Indeed, by analogy with the fax, a new means of communication is not supposed to transform the legal relations. In practice, information technologies raise new questions that the legislation has not addressed. On the one hand, the possibilities of communicating create new legal relationships. This is illustrated by blockchains, which can serve as a means of proof or integrate "smart contracts". On the other hand, the web tests the limits of classic legal concepts. For example, the loan between individuals online is clearly distinguished from the loan contract as envisaged by the Civil Code. Finally, particularly complex questions may arise for web designers and web entrepreneurs in terms of competent court and applicable law.
Faq
Images under Creative Commons License: The CC0 license allows the rights holder to waive them as much as possible within the limits of applicable laws, in order to place his work as close as possible to the public domain4. For example, it is not possible in France to waive one's moral rights.
The moral right in question is defined in article L.121-1 of the intellectual property code. Which states: “The author enjoys the right to respect for his name, his quality and his work."In practice there are sites such as pixabay.com, which provide images under the CCO license. The authors have waived their partrimonial rights, but not their moral rights. Thus, these images are usable, but strictly speaking are not free of rights.
With regard to the import of means of cryptology , it is necessary to distinguish.
If these means are intended only for authentication and integrity control, the import is free.
Otherwise, the import must be declared to the National Agency for the Security of Information Systems. If this is not done an offense is committed. It seems unlikely to be difficult to ensure that the editors of the Tructypt forks have taken care of the prior declaration to ANSSI. Therefore, downloading these tools constitutes an offense.
In addition, cryptology is also covered by the code of criminal procedure in article 230-1, which provides:
the public prosecutor, the court investigation, the judicial police officer, with the authorization of the public prosecutor or the examining magistrate, or the trial court hearing the case may designate any qualified natural or legal person, in order to carry out the technical operations making it possible to obtain access to this information, its unencrypted version as well as, in the case where a means of cryptology has been used, the secret decryption convention, if this appears necessary.
In short, the judicial authority can ask experts to crack the code (which supposes that this is possible).
More prosaically, the judicial authority can ask the holder of encrypted objects to hand over the key. This in application of article Article 434-15-2 of the penal code, which provides:
Is punished by three years of imprisonment and a 270,000 € fine the fact, for anyone having knowledge of the secret convention of decryption of a means of cryptology likely to have been used to prepare, facilitate or commit a crime or an offense, to refuse to deliver said convention to the judicial authorities or to implement it, on requisitions from these authorities issued in application of Titles II and III of Book I of the Code of Criminal Procedure. If the refusal is opposed while the postponement or the implementation of the convention would have made it possible to avoid the commission of a crime or an offense or to limit the effects thereof, the penalty is increased to five years of imprisonment and a € 450,000 fine.
With regard to the import, possession, offer, transfer or making available allowing intrusion, article 323-3-1 of The Penal Code provides: The fact, without a legitimate reason, in particular for research or computer security, to import, hold, offer, transfer or make available an equipment, an instrument, a computer program or any data designed or specially adapted to commit one or more of the offenses provided for in articles 323-1 to 323-3 is punishable by the penalties provided respectively for the offense itself or for the most severely punished offense.
Clearly, unless you have a legitimate reason, being in possession of Kali Linux for example is a offense punished as if there had been an intrusion.